🚀 Our training courses are CPF-eligible!
Reading time : 5 min
The concept of "Kill Chain" is again a concept that comes from the military world.
In the world of cyber security, this concept is attached to the field of "Cyber Threat Intelligence" (CTI), which is the field where intelligence about attackers is sought in order to better protect against them.
The "Kill Chain" concept has been implemented in two different repositories, which we will discover in this lesson.
The "Cyber Kill Chain" benchmark was published in 2011 by Lockheed Martin. In the "Cyber Kill Chain", a cyber attack is broken down into 7 chronological steps:
In this first phase, the attacker will try to collect as much information as possible about his target.
If technical information will be collected thanks to tools (domain names, IP addresses, etc.), the attacker will also use OpenSource Intelligence (OSINT), to collect publicly available information, for example on social networks or news sites (e-mail addresses, names and functions of employees).
Once the attacker is well informed about his victim, he will be able to put together a suitable arsenal to carry out his plan.
He will have the possibility to choose among existing tools (for example non-malicious tools but which will then be diverted from their initial function), to buy malicious software, or to design his own tools.
After the well-prepared arsenal, the attacker will have to find a way to transfer all or part of his weaponry to his victim (payload in English).
To do this, the attacker has several solutions, among the most well-known:
In this phase, the attacker's payload is executed, and will exploit a vulnerability to gain initial access (foothold) on the target's information system.
After gaining initial access, the attacker must now work to gain sustained access to the information system.
This means that if he loses the connection (in the event of a system reboot, for example), he should not have to repeat the previous phases to regain his access.
There are several techniques for maintaining access to the target:
The attacker will now seek to be able to work efficiently, sometimes with limited initial access.
He will therefore use a command and control tool (abbreviated C2 or C&C), which allows him to perform all his operations remotely, from an interface prepared for his attack.
Among the best known Command and Control tools:
The last step for the attacker is of course to achieve his objectives. Having now access to the victim's information system, he will be able to achieve his goal, either indirectly :
Either directly:
The Unified Kill Chain (abbreviated to UKC) is another kill chain repository tailored to cyber security.
This repository, complementary to the "Cyber Kill Chain," was first published in 2017 and is much more detailed, consisting of 18 phases.
Note that these 18 phases are not all systematically implemented during an attack. They are divided into three main stages, which we will now discuss.
The "In" stage is the initial access stage, and it contains the following phases:
The "Through" stage is the stage where the attacker will take control of the target's information system, the phases are the following:
Just like in the last stage of the "Cyber Kill Chian" the attacker now has the necessary access to the victim's information system to achieve his objectives. The last phases of the "Unified Kill Chain" are :
The MITRE Att&ck repository is a dynamic "Kill Chain", which allows to visualize the tools and techniques used by already known attackers.
A complete course is available on Seela to learn how to use the MITRE Att&ck repository.
Start your cybersecurity training!
100% online
Theory & Practice
Customized by level
Start your cybersecurity training
Training
Career
Cybersecurity
100% online
Breathe new life into your career with our cybersecurity training courses
The quality certification has been issued under the category
" ACTIONS FORMATION "
© Seela - 24/11/2022
Training organization
N°11755030075
This registration does not imply state approval.
The Qualiopi certificate is available on request from information@seela.io
About us
Resources